HOW ACTIVE DIRECTORY TOOLS SIMPLIFY USER ACCESS AND SECURITY CONTROLS